Dynamic Channel Sharing in Open-Spectrum Wireless Networks

Size: px
Start display at page:

Download "Dynamic Channel Sharing in Open-Spectrum Wireless Networks"

Transcription

1 Dynamic Channel Sharing in Open-Spectrum Wireless Networks Wei Wang and Xin Liu Department of Computer Science University of California, Davis Davis, CA 91, U. S. A. {wangw, Abstract The current fixed spectrum allocation scheme leads to significant spectrum white spaces. It requires a more effective spectrum allocation and utilization policy, which allows unused parts of spectrum to become available temporarily for commercial purposes so that the scarcity of the spectrum can be largely mitigated. This paper is an early attempt to study such wireless networks with opportunistic spectrum availability and access. We studied the dynamics in the available channels caused by the location and traffic load of the primary users and proposed several distributed algorithms to exploit the available channels for secondary users. The performance of different algorithms is evaluated in networks with static and time-varying channel availability. I. INTRODUCTION The current fixed spectrum allocation scheme can lead to significant spectrum white spaces (spectrum that is not used at all for some time). Experiments conducted by Shared Spectrum Company indicate as much as 2% of white space below 3GHz band even in the most crowed area near downtown Washington DC, where both government and commercial spectrum usage are intensive [1]. Such low utilization and increasing demand for the radio spectrum suggest a more effective spectrum allocation and utilization policy, which allows unused parts of spectrum to become available temporarily for commercial purposes so that the scarcity of the spectrum can be largely mitigated. In this paper, we focus on the opportunistic exploration of the white space by users other than the primary licensed ones on a non-interfering or leasing basis. Such usage is being enabled by regulatory policy initiatives and radio technology advances. First, both the Federal Communications Commission (FCC) and the federal government have made important initiatives towards more flexible and dynamic spectrum usage, e.g., [2], [3]. Further, opportunistic spectrum sharing is enabled by software-defined radio or cognitive radio technologies, where these technology advances provide the capability for a radio device to sense and operate on a wide range of frequencies using appropriate communication mechanisms, and thus enable dynamic and more intense spectrum reuse in space, time, and frequency dimensions. We focus on the study of the secondary users who observe the channel availability dynamically and explore it opportunistically. Here, secondary users refer to spectrum users who are not owner of the spectrum and operate based on agreements/etiquettes imposed by the primary users/owners of the spectrum. We study the impact of the opportunistic spectrum availability on the secondary users who explore the spectrum when allowed by the primary users of the spectrum. (Note that the secondary users may have their own licensed/allocated bandwidth where they are primary users, which is not the concern of this paper.) Because of the traffic load and the distribution of the primary users, the available channels observed by the secondary users are time-varying and location-dependent. We study the impact of the characteristics of primary users on the spectrum opportunistic availability. We present a general framework to model the correlation between primary and secondary users and introduce a new metric to capture the impact of potential opportunistic spectrum sharing. We also propose several distributed spectrum access algorithms and study their performance under the above-mentioned time-varying and location-dependent channel availabilities. II. A FRAMEWORK FOR OPEN SPECTRUM CHANNEL SHARING We first introduce a model for channel availability observed by the secondary users. Note that such availabilities are location-dependent and time-varying, which is incurred by the activities of the primary users. We abstract each network topology into a graph, where vertexes represent wireless users such as wireless lines, WLANs, or cells, and edges represent interferences between vertexes. In particular, if two vertexes are connected by an edge in the graph, we assume that these two nodes cannot use the same spectrum simultaneously. In addition, we associate with each vertex a set, which represents the available spectra at this location. Due to the differences in the geographical location of each vertex, the sets of spectra of different nodes may be different. Furthermore, a node may observe time-varying channel availability due to the traffic load variation of the primary users. In Figure 1, we show a model of such networks. The five vertexes 1- represent five different secondary or opportunistic users. There are three frequency bands, namely A, B, and C, which are communication channels that are opportunistically available to the secondary users (vertexes 1- in this figure). We assume that all channels have the same bandwidth, which can be generalized easily. In addition, four primary users I- IV are present, using bands B, A, B, and C, respectively.

2 Fig. 1. A color graph Due to the sharing agreement, channels used by primary users cannot be utilized by secondary users in vicinity. Therefore, we assume that nodes within certain ranges of the primary users I-IV cannot reuse the same frequency. In other words, if a vertex is within the dashed circle of a specific primary user, it cannot access that bandwidth used by that primary user. For instance, Node 2 is within the interference range of primary user I, who uses channel B. Therefore, channel B is not available for Node 2. As a consequence, each node has access to a different set of bandwidths. In our figure, the available channels are (A,B,C) at vertex 1, (A,C) at vertex 2, etc. The resource allocation problem is how they should share these bandwidth. Note that Figure 1 shows a snapshot of the network. In practice, time-varying channel availability could be introduced by the mobility of users (both primary and secondary) and the traffic load variation of primary users. For instance, in the numerical results, we introduce the time-varying channel availability at secondary users by varying the usage of primary users. We consider a time-slotted system. In a generic time slot, if a primary user occupies one channel, it will keep the same channel in the next time slot with the probability p 11 ; if a primary user is idle on one channel, it will occupy a channel in the next time slot with the probability p 1. Then, the channel availability of a secondary user varies at each time slot depending on all the primary users. Such policy can be considered as an approximate exponential ON/OFF traffic model for the primary users. Other traffic models can be introduced similarly. When channel availabilities change, secondary users need to adjust their channel allocation accordingly. They may also need to exchange information with neighboring nodes. However, secondary users may have limited ability of information exchange and experience delay during information exchange because secondary users coexist in an ad-hoc manner. This is different from celluar systems where dedicated (and private) signalling channels exist between cells. Limit information exchange imposes an additional challenge on opportunistic channel sharing algorithms. We make the following assumptions in the paper. We assume that channel availabilities are given to secondary users, and focus on how to share the opportunistic spectrum among secondary users. We acknowledge that it is a challenging problem in itself to decide whether a spectrum can be used by the secondary users. The proposals for solving this problem include carrier sensing, signal-strength based methods, beacon-based methods (a beacon indicates the availability of unavailability of a spectrum), location and database based mechanisms (a node has location information and can check a database about the availability of a spectrum), etc. Furthermore, we assume that secondary users have elastic data traffic and can fully utilize the amount of spectrum being allocated. This is the benchmark case in terms of spectrum requirements. On the other hand, our proposed algorithms can easily adapt to the cases where nodes have (different) limited requirements. In particular, a node can stop requiring more channels after all its needs have been satisfied. III. PROBLEM FORMULATION Using the model described earlier, we formulate the channel allocation problem as a graph coloring problem. We abstract the network as a undirected graph G = (V, E, L), where vertexes represent users, and edges represent interferences so that no channels (frequency bands) can be assigned simultaneously to any adjacent nodes. For simplicity, we assume that the interference graph is the same for all frequency bands. This can be generalized to the case where each frequency has its own interference graph, a possible scenario due to the different propagation properties in the environment associated with individual bandwidth. Furthermore, let K be the number of available channels in G. Although it is possible that different channels have different bandwidths, we treat all channels the same for simplicity. We also refer to the graph G as the interference graph. In the paper, we use channel and color interchangeably. Let N = V denote the total number of users. Let edges be represented by the N N matrix E = {e ij }, where e i,j = 1 if there is an edge between vertexes i and j, and e i,j = implies that i and j may use same frequencies. Note that since G is an un-directional graph, E is symmetric. In a similar notation, we represent the availability of frequencies at vertexes of G by a N K matrix L = {l ik }, which we refer to as the coloring matrix. In particular, l ik = 1 means that color (channel) k is available at vertex i, and l ik = otherwise. For instance, Figure 1 is represented by the matrices E = , L = Let us denote a color/channel assignment policy by an N K matrix S = {s ik }, where s ik = or 1, and s ik = 1 if color k is assigned to the node i and otherwise. We call S a feasible assignment if the assignments satisfy the interference graph constraint and the color availability constraint. More specifically, for any node i, we have s ik = if l ik = (i.e.,

3 a color can be assigned only if it is available at the node). Furthermore, s ik s jk e ij =, i, j = 1,, N, k = 1,, K. In other words, two connected nodes cannot be assigned same colors. The objective of the resource allocation is to maximize the spectrum utilization. This problem can be formally represented as the following non-linear integer programming problem. maximize S N i=1 k=1 subject to s ik l ik, K s ik (1) s ik s jk e ij =, s ik =, 1, for all i, j = 1,, N, k = 1,, K. The above problem is sometimes referred to as a list multi-coloring problem. When time is taken into account, a time index can be introduced into the equation where the objective is to maximize the utilization averaged over time and the three constraints are satisfied at each time instance. The corresponding decision list-coloring problem is formulated below. Definition 1: (DListColor Problem) Given a graph G = (V, E, L) and a positive integer B. Is there a solution such that N i=1 k=1 K s ik > B, (2) with the same set of constraints as in Eq. (1)? Proposition 1: The DListColor problem is NP-complete. Proof: This problem is clearly in NP since once a valid coloring assignment S is obtained, condition (2) may be verified in O( V K) time. We now show that the maximum clique problem 1 can be reduced to the DListColor problem in polynomial-time, and that the maximum clique problem has a solution if and only if DListColor has a solution. Let G = (V, E) be the undirected graph of the maximum clique problem. We construct the graph G = (V, E, L) for our DListColor problem, such that V = V, and E is the complimentary set of E. Furthermore, the color matrix L is of dimension V 1, where L = [1, 1,..., 1] T. Since any pair of nodes connected in G are not connected in G and vice versa, we cannot simultaneously assign nodes in G the same color if these nodes form a clique in G. Therefore, there exists a clique in G of size at least m if and only there is no solution for DListColor for B = V m. This reduction is obviously polynomial-time. Q.E.D. 1 A clique is a fully connected subgraph; i.e., a clique consists of a set of nodes any pair of which has an edge in between. A. Color Decoupling The list-coloring problem may be reduced to a set of maximum size clique problems when fairness is not a consideration. In other words, in the process of finding the maximum in Eq. (1), nodes are allowed to be assigned zero channels. The problem of assigning each nodes with a set of colors may be solved by coloring the graph in sequence with individual colors: maximize S N K K s ik i=1 k=1 k=1 maximize S k N s ik (3) i=1 where S k denotes the channel allocation with respect to channel (color) k. More specifically, S k is the kth column in the assignment matrix S. Note that the equality in (3) does not hold in general situations, e.g., a graph coloring problem that requires each node to be colored with non-empty colors. Note that when fairness is taken into account, e.g., each node has to be assigned at least one color, then the decoupling property does not apply. IV. PROPOSED ALGORITHMS In this section, we discuss several approaches to the resource allocation problem formulated above. We prefer distributed algorithms because of their robustness and scalability. We use a brute force search algorithm with which we find optimal solutions to serve as a benchmark. Because the resource allocation problem is NP-complete, optimal solutions may only be found when graphs are relatively small. We then present a distributed greedy algorithm, a distributed fair algorithm, and a distributed randomized algorithm with various complexity and performance. A. Optimal Solutions: Benchmark Given the list-coloring problem and a graph G = (V, E, L), we seek the solutions to the following optimization problem (1). As discussed in Section II, the optimization problem is NP-complete. Therefore, in order to find the optimal solution(s), we must search through all valid color assignments, and find the one(s) that maximizes (1). We carry out this search in a breadth-first recursive manner, with the starting node chosen arbitrarily. More specifically, when the node i is visited, we enumerate all combination of channel allocations for this node permissible by the available channels at i, and iterate through each configuration and tentatively assign it to the node. If there is conflict between the current assignment attempt and neighboring nodes whose channels have already been selected, we abort this assignment. The complexity can be reduce if we use the color decoupling property described in Section III-A, and modify our search algorithm so that the color assignment is optimized subsequently for each color. The resulting algorithm has a complexity of O(K 2 N ). However, this reduction of complexity is not achieved without penalty. For example, since channels are assigned independently of each other, it is no longer straightforward to find a policy that assigns each user at least one channel.

4 B. Distributed Greedy Algorithm Because the resource allocation problem is NP-complete, heuristics are needed to study large graphs. In this section, we present a distributed greedy algorithm with the objective of maximizing the utilization. Because of the color decoupling propertied discussed in Section III-A. the distributed greedy algorithm handles colors one by one. For each color, a greedy assignment is calculated to maximize the number of nodes assigned to this color. To elaborate, consider the assignment of the color i. A subgraph G i = {V i, E i } is generated, where a node belongs to V i if and only if it belongs to V and color i can be used at the node. An edge connects two nodes in V i if and only if these two nodes are connected in the original graph G. For instance, for the case presented in Figure 1, the subgraph for color A consists of node 1, 2, and, and a link between 1 and 2. The greedy algorithm performs as if nodes are ranked according to their link degrees from low to high for each color. Then the color is assigned to the nodes according to their link degrees from low to high. When a tie exists, the number of assigned colors of each node is used to break the tie. Nodes with less assigned colors has higher priority. If the nodes have the same number of assigned colors, ties are broken randomly. The algorithm can result in very unfair allocation. Node with lower link degrees will obtain more resource in general. C. Distributed Fair Algorithm As discussed in the previous section, the greedy algorithm can result in very unfair allocations. In this section, we discuss a distributed algorithm with fairness considerations. The algorithm has three steps. Step 1 is to build an acyclic directional graph. The building of the acyclic directional graph is motivated by [7], although the link degrees of nodes are not taken into account in [7] and no iteration is required due to the difference in objectives. All nodes exchange information about their link degree, color degree (color degree is the number of available color at each node), and a random number. The edges are oriented from higher color degree to lower; i.e., nodes with smaller number of colors are the receivers. If two connected nodes have the same number of colors, the edge is oriented from high link degree to lower link degree. If there is a tie again, the edge is oriented from the node with the larger random number. Thus, an acyclic directional graph is generated. A node is a sink node if there is no edge oriented from it. A node is a source node if there is no edge oriented to it. Note that it is possible that there are multiple source and sink nodes. Step 2 is to assign colors. At most one color is assigned to each node in one iteration. The color assignment starts with sink nodes. If a node is a sink node, it picks a color that can be used by the minimum number of neighbors. It updates this information to all neighbors, who remove the color from their available color lists. In addition, a set-color token is passed to the neighbors to enable their color searching. If a nonsink node obtains set-color tokens from all its downstream neighbors, the node becomes a sink node and repeats the same process. Thus, the color selection performs from sink to source nodes step by step. Step 3 is to start the next iteration if needed. After a source node performs the process, it generates a reset token and passes to all its neighbors. If a node receives reset tokens from all its upstream neighbors, it sends a reset token to all its downstream neighbors. After all nodes receive reset token, the system resets and go to step 1 with their remaining colors. If a node is out of available color, it quits the operation. When no nodes have available colors remaining, the operation stops. D. Randomized Distributed Algorithm The above distributed algorithms may need a large number of iterations when a large number of nodes and colors are involved. When the size of the network is large, large communication overhead will occur. So the distributed randomized algorithm is proposed to reduce the delay and communication cost. The algorithm is inspired by the IEEE backoff algorithms in MAC protocols, although the objective is different. In 82.11, the station doubles its contention window to reduce the probability of collision when its transmission fails. In our algorithm, a node will increase its chance to win the next color when it fails to get a color contending with its neighbors. Each node generates a random number for each of its available colors uniformly from [, window]. Within one round, the node goes through all its available colors. If it has the highest random number among all its neighbors for one color, it then wins the color. Then each node exchanges information with its neighbors of what colors it gets and deletes the colors obtained by its neighbors from its own available color list. If it loses one color, it doubles its window; If it wins one color, it divides its window by 2. Then each node recomputes its random number from [, window] and start the next round. The randomized distributed algorithm has a small communication overhead. It also converges faster compared with the distributed fair algorithm, especially when the number of nodes and colors are large. V. NUMERICAL RESULTS In this section, numerical results are used to illustrate the impact of the location-dependency and time-variance of the channel availability and evaluate the performance of the proposed algorithms. We first show study a snapshot of the network. It means that the channel availability is fixed during the executions of the algorithms. Thus, the impact of the location-dependency of the channel availability is illustrated. Then we will introduce the time-variance into the channel availability and evaluate its impact. We measure utilization by computing the average number of channels (colors) assigned to each vertex, which is also referred to as utility. The fairness metric is the variance of channel allocations in each assignment. The smaller the variance, the fairer the assignment. If all nodes obtain the same number of channels in an assignment, then the fairness

5 Utilization Fair Random Greedy Optimal Fig. 2. Primary users Ring Topology Hexagon-Triangle Topol- Fig. 3. ogy Primary users Variance Fair Random Greedy Optimal metric is zero. In general, the fairness metric is not zero even if the assignment is max-min fair, because nodes have different available channels and it may be impossible for all nodes to obtain the same number of channels. A. Simulation Setup Given a topology geographically, we use the following model to generate a snapshot of the channel availability for the nodes of interests. Each channel has N I primary users (also refereed to as interferers) that are uniformly distributed in a unit square area. With probability p I, each of the primary users is active, independent of other users. A channel is available at a vertex (the secondary user) if and only if it is not within the interference range (R I ) of any active primary users of the channel. We generate the availability of K different channels independently. This is similar to the scenarios shown in Figure 1 except that all primary users have the same interference range, R I. We illustrate the results in two fixed topologies. In the fixed topology, unless otherwise specified, we set R I =.1, p I =.2 and K, the total number of channels in the network to be 1. The first topology is a simple six-node ring as shown in Figure 2. The objective here is to study symmetric topologies, where all nodes are identical: each node has two neighbors and the same characteristics of available colors (in a statistical sense). Although not shown here, we observe that all six users obtain roughly the same amount of bandwidth averaged over simulations. The second topology shows a combination of symmetric and asymmetric nodes, as in Figure 3. In particular, node is in the worst position, which interferes with all other nodes. Nodes 1-3 and - are symmetric and so do nodes 7 and 8. B. Performance Under the Snapshot of the Network We first show the performance of the proposed algorithms under the snapshot of the network. We generate 1 different snapshots of the network for each topology. The performance is averaged over all nodes and over all snapshots. Ring: Figure compares the average performance (average over all nodes and over all simulations) of the four algorithms in different sets of parameters in the Ring topology. The first subplot compares the average utility (number of channels assigned per node) of the four algorithms. We observe that in all cases, the greedy algorithm can always achieve the same utilization as the optimal solution, followed by the randomized and fair algorithms. With the increase of N I, each Utilization Fig.. Ring performance Fig.. Index Hexagon-triangle topology bar Fair Random Greedy Optimal node observes less available channels, and thus lower average utility. As an illustration of fairness, the second subplot shows the variance among different nodes of the four algorithms, which is the variance of each allocation schemes averaged over 1 simulations. The fair algorithm has the lowest average variance value and thus claims the most fair. The random and greedy algorithm have similar performance. In summary, in the Ring topology, the greedy algorithm can achieve the best utilization at the cost of relatively high variance. The fair algorithm can achieve the smallest variance, but also with the smallest utilization. The randomized algorithm has the moderate performance among the three. The advantage of the randomized algorithm is that it has the smallest communication overhead and convergence time. Such performance reflects the difference in the design principle of the three algorithms. Hexagon-triangle: The performance of the three algorithms is similar to that under the Ring topology, which is ignored here. To further understand the principle of the algorithms, let us take a look at Figure. It shows the performance of different algorithms at different nodes. The four bars from left to right are the results of the fair, randomized, greedy and optimal algorithms. Since Node is the node which interferes the most number of other nodes, the optimal and greedy algorithms allocate least spectrum to it in order to maximize the total utilization. In contrast, the fair and randomized algorithms allocate much more spectrum to Node so that they are fairer than the optimal and greedy algorithms. For the fair algorithm, Node has a slightly lower allocation compared with other nodes because it is more likely to run out of colors first. Similar result is also observed for the randomized algorithm, where Node needs to compete with 8 other nodes.

6 Utilization Variance Fig.. Fair Random Greedy Fair Random Greedy Real-time Convergence Real-time Convergence Real-time vs. convergence in the Ring topology C. Performance Under the Time-varying Channel Availability In the above studies, we focused on the snapshot of the system where the channel availability of the primary users is fixed after it is generated. In practice, the channel availability is time-varying due to the traffic activity of the primary users. So it is essential to study the impact of the time-varying channel property on the performance of the proposed algorithms. We introduce the time-varying channel availability at secondary users by varying the usage of primary users as discussed in Section II. In the simulation, we set p 11 =.8 and p 1 =.2. Such policy can be considered as an approximate exponential ON/OFF traffic model for the primary users with an average ON/OFF period of time slots. We assume that in each time slot, secondary users can only exchange information once. This can happen when the changes of channel availabilities are relatively fast and the information exchanges channel between secondary users have limited bandwidth and/or experience delay. This constraint is imposed to test the real-time performance of the proposed algorithms that may not converge in one iteration. That is, after one time slot, not all the available channels will be assigned. We call this partial assignment real-time performance. We are interested in the difference between the real-time performance and off-line converged performance, i.e., difference between the partial channel allocation done in one time slot and the converged result, where the latter is what we get under the snapshot of the network. Such difference reveals the impact of the time-varying channel availability on the performance of the proposed algorithms. The smaller the difference, the better the performance when the proposed algorithms are used under time-varying channel availabilities. Figure show the performance comparisons among three distributed algorithms in the Ring topology (similar performance is observed under H-T topology). We do not show the performance of the optimal algorithm because it only serves as a benchmark under the snapshot of the network. In the simulation, the total number of channels is still 1, and the number of primary users is 8. As shown in the figures, the randomized algorithm has the smallest difference in the utilization between the real-time and convergence performance, followed by the greedy algorithm. The fair algorithm has the largest difference between the real-time and convergence performance. Recall that, the randomized algorithm is designed with the objective of small communication overhead and short convergence time. It means that the randomized algorithm allocates most of the available channels in the first iteration. On the other hand, due to the complexity of the fair algorithm, it can only allocate a small portion of its available channels in one iteration, leading to the large difference. The small variance of the fair algorithm is caused by the small value of the assigned colors. Since the variance is defined as the standard deviation, the variance could also be small when the value of the assigned colors is small. From the above results, we can conclude that the timevarying channel availability does affect the performance of the proposed algorithms. But the difference between real-time and convergence performance is not very large, especially for the randomized and greedy algorithms. Under the time-varying channel availability, the randomized algorithm has the smallest difference between the realtime and convergence performance due to its low complexity. The fair algorithm has the largest difference and the greedy performs in between. In a network with opportunistic spectrum availability and access, the channel allocation algorithm may only have limited information exchange before the current channel availability changes. Therefore, the algorithm with low complexity and communication overhead is preferred due to the time-variance in channel availabilities. VI. CONCLUSIONS In this paper, we present a framework to illustrate the relationship between channel availability of secondary users and the usage of primary users. We pointed out two unique properties are inherent to systems with opportunistic spectrum availabilities and are independent to resource allocation schemes. They are location-dependency and time-variance. Based on the framework, we formulate the channel allocation problem as a list-coloring problem with the objective of maximizing the total spectrum utilization. We show the optimal allocation problem is NP-complete and develop several distributed algorithms. The proposed distributed greedy algorithm achieves close to optimal resource utilization. In addition, a distributed fair algorithm is proposed that achieves better fairness while maintaining a good level of spectrum utilization. Last, a distributed randomized algorithm is introduced with low complexity and communication overhead. The performance of the proposed algorithms is validated in scenarios with time-varying and location dependent channel availabilities. In particular, the greedy and the randomized algorithms are shown to remain effective under scenarios where users have only limited information exchange ability. Due to the time-variance of the channel availability, algorithms with low complexity and communication overhead are preferred. REFERENCES [1] M. McHenry, Spectrum white space measurements, presented to New America Foundation BroadBand Forum, June 23, Docs/pdfs/DocFile 18 1.pdf.

7 [2] FCC, In the matter of promoting efficient use of spectrum through elimination of barriers to the development of secondary markets, WT Docket No. -23, FCC Rcd 2. [3], Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies, notice of proposed rule making and order, FCC [], Establishment of an interference temperature metric to quantify and manage interference and to expand available unlicensed operation in certain fixed, mobile and satellite frequency bands, ET Docket No , FCC [], Promoting efficient use of spectrum through elimination of barriers to the development of secondary markets, WT Docket No. -23, report and order and further notice of proposed rulemaking, FCC (secondary markets report and order and FNPRM). [] DARPA, Defense advanced research projects agency (DARPA) next Generation (XG) communications program, [7] N. Garg, M. Papatriantafilou, and P. Tsigas, Distributed long-lived list colouring: how to dynamically allocate frequencies in cellular networks, Wireless Networks, vol. 8, no. 1, pp. 9, 22.

Collaboration and Fairness in Opportunistic Spectrum Access

Collaboration and Fairness in Opportunistic Spectrum Access Collaboration and Fairness in Opportunistic Spectrum Access Haitao Zheng Wireless and Networking Group Microsoft Research Asia, eijing, P.R. China Email: htzheng@microsoft.com Chunyi Peng Dept. of Automation

More information

ALLOCATING RF SPECTRUM PARTITIONS IN A CBRS NETWORK

ALLOCATING RF SPECTRUM PARTITIONS IN A CBRS NETWORK Technical Disclosure Commons Defensive Publications Series September 19, 2017 ALLOCATING RF SPECTRUM PARTITIONS IN A CBRS NETWORK Yi Hsuan Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Complementary Graph Coloring

Complementary Graph Coloring International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

6 Randomized rounding of semidefinite programs

6 Randomized rounding of semidefinite programs 6 Randomized rounding of semidefinite programs We now turn to a new tool which gives substantially improved performance guarantees for some problems We now show how nonlinear programming relaxations can

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Resource Allocation in Contention-Based WiFi Networks

Resource Allocation in Contention-Based WiFi Networks The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),

More information

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Michelle X. Gong Scott F. Midkiff Shiwen Mao The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic

More information

Coordinated carrier aggregation for campus of home base stations

Coordinated carrier aggregation for campus of home base stations 2015 IEEE 2015 International Symposium on Wireless Communication Systems (ISWCS), Brussels (Belgium), Aug. 2015 DOI: 10.1109/ISWCS.2015.7454390 Coordinated carrier aggregation for campus of home base stations

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

MOST attention in the literature of network codes has

MOST attention in the literature of network codes has 3862 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 8, AUGUST 2010 Efficient Network Code Design for Cyclic Networks Elona Erez, Member, IEEE, and Meir Feder, Fellow, IEEE Abstract This paper introduces

More information

Channel Allocation for IEEE Mesh Networks

Channel Allocation for IEEE Mesh Networks Institut für Technische Informatik und Kommunikationsnetze Channel Allocation for IEEE 802.16 Mesh Networks Till Kleisli Master s Thesis MA-2006-24 April 2006 until October 2006 Advisors: Dr. Ulrich Fiedler,

More information

PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS

PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS International Journal of Industrial Electronics Electrical Engineering, ISSN: 2347-6982 PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS 1 GOURI P. BRAHMANKAR, 2 S. B. MULE 1 M.E. (Student),

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks

Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 12-17-2010 Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks

More information

A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks

A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks Yi Shi Y. Thomas Hou The Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA Abstract Cognitive

More information

Simple Channel-Change Games for Spectrum- Agile Wireless Networks

Simple Channel-Change Games for Spectrum- Agile Wireless Networks 1 Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 5 th, 26 Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Abstract The proliferation

More information

Throughout this course, we use the terms vertex and node interchangeably.

Throughout this course, we use the terms vertex and node interchangeably. Chapter Vertex Coloring. Introduction Vertex coloring is an infamous graph theory problem. It is also a useful toy example to see the style of this course already in the first lecture. Vertex coloring

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex

More information

Optimal Detector Locations for OD Matrix Estimation

Optimal Detector Locations for OD Matrix Estimation Optimal Detector Locations for OD Matrix Estimation Ying Liu 1, Xiaorong Lai, Gang-len Chang 3 Abstract This paper has investigated critical issues associated with Optimal Detector Locations for OD matrix

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Randomized Algorithms

Randomized Algorithms Randomized Algorithms Last time Network topologies Intro to MPI Matrix-matrix multiplication Today MPI I/O Randomized Algorithms Parallel k-select Graph coloring Assignment 2 Parallel I/O Goal of Parallel

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings

A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings Xin Yuan Amit Fulay Department of Computer Science Florida State University Tallahassee, FL 32306 {xyuan, fulay}@cs.fsu.edu Abstract

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO Prof.Abdul Sayeed 1,Vinay Mengu 2,Sharikh Khan 3,Mohammed Moria 4 1,2,3,4 Department of Electronics & Telecommunication

More information

Opportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks

Opportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks 1610 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 5, OCTOBER 2010 Opportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks Shan Chu, Graduate Student Member, IEEE, andxinwang, Member,

More information

On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches

On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches E. Miller R. Libeskind-Hadas D. Barnard W. Chang K. Dresner W. M. Turner

More information

arxiv: v3 [cs.dm] 12 Jun 2014

arxiv: v3 [cs.dm] 12 Jun 2014 On Maximum Differential Coloring of Planar Graphs M. A. Bekos 1, M. Kaufmann 1, S. Kobourov, S. Veeramoni 1 Wilhelm-Schickard-Institut für Informatik - Universität Tübingen, Germany Department of Computer

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) COMMENTS OF CTIA - THE WIRELESS ASSOCIATION

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) COMMENTS OF CTIA - THE WIRELESS ASSOCIATION Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of Revisions to Rules Authorizing the Operation of Low Power Auxiliary Stations in the 698-806 MHz Band Public Interest Spectrum

More information

Approximability Results for the p-center Problem

Approximability Results for the p-center Problem Approximability Results for the p-center Problem Stefan Buettcher Course Project Algorithm Design and Analysis Prof. Timothy Chan University of Waterloo, Spring 2004 The p-center

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

IEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks

IEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks IEEE 1900.4: Standard for Optimized Radio Resource Usage in Composite Wireless Networks Babak Siabi Isfahan University of Technology b.siabi@ec.iut.ac.ir Abstract Newly published IEEE 1900.4 standard is

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 2 Part 4: Dividing Networks into Clusters The problem l Graph partitioning

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

J. Parallel Distrib. Comput. Large-scale access scheduling in wireless mesh networks using social centrality

J. Parallel Distrib. Comput. Large-scale access scheduling in wireless mesh networks using social centrality J. Parallel Distrib. Comput. 73 (2013) 1049 1065 Contents lists available at SciVerse ScienceDirect J. Parallel Distrib. Comput. journal homepage: www.elsevier.com/locate/jpdc Large-scale access scheduling

More information

A game theoretic framework for distributed self-coexistence among IEEE networks

A game theoretic framework for distributed self-coexistence among IEEE networks A game theoretic framework for distributed self-coexistence among IEEE 82.22 networks S. Sengupta and R. Chandramouli Electrical and Computer Engineering Stevens Institute of Technology Hoboken, NJ 73

More information

Distributed Rule-Regulated Spectrum Sharing

Distributed Rule-Regulated Spectrum Sharing 1 Distributed Rule-Regulated Spectrum Sharing Lili Cao and Haitao Zheng * Department of Computer Science University of California, Santa Barbara, CA 931 U.S.A Email: {lilicao,htzheng}@cs.ucsb.edu Abstract

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

11.1 Facility Location

11.1 Facility Location CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Link Scheduling in Multi-Transmit-Receive Wireless Networks

Link Scheduling in Multi-Transmit-Receive Wireless Networks Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Lecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University)

Lecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University) Transportation and Assignment Problems The transportation model is a special class of linear programs. It received this name because many of its applications involve determining how to optimally transport

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Device-to-Device Networking Meets Cellular via Network Coding

Device-to-Device Networking Meets Cellular via Network Coding Device-to-Device Networking Meets Cellular via Network Coding Yasaman Keshtkarjahromi, Student Member, IEEE, Hulya Seferoglu, Member, IEEE, Rashid Ansari, Fellow, IEEE, and Ashfaq Khokhar, Fellow, IEEE

More information

Self-coordinating Localized Fair Queueing in Wireless Ad Hoc Networks

Self-coordinating Localized Fair Queueing in Wireless Ad Hoc Networks To appear in IEEE Transactions on Mobile Computing, Vol. 3, No. 1, January-March 2004 1 Self-coordinating Localized Fair Queueing in Wireless Ad Hoc Networks Haiyun Luo, Jerry Cheng, Songwu Lu UCLA Computer

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Cognitive Radios In TV White Spaces

Cognitive Radios In TV White Spaces Cognitive Radios In TV White Spaces Monisha Ghosh Philips Research North America November 2 nd, 2007 Outline White Spaces : what, why and when Cognitive Radio: applications to TV white spaces. Technical

More information

Multichannel Outage-aware MAC Protocols for Wireless Networks

Multichannel Outage-aware MAC Protocols for Wireless Networks Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs Yung-Chang Lin Cheng-Han Lin Wen-Shyang Hwang Ce-Kuen Shieh yaya80306@hotmail.com jhlin5@cc.kuas.edu.tw wshwang@cc.kuas.edu.tw

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Distributed Fault-Tolerant Channel Allocation for Cellular Networks

Distributed Fault-Tolerant Channel Allocation for Cellular Networks 1326 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 7, JULY 2000 Distributed Fault-Tolerant Channel Allocation for Cellular Networks Guohong Cao, Associate Member, IEEE, and Mukesh Singhal,

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Randomized algorithms have several advantages over deterministic ones. We discuss them here:

Randomized algorithms have several advantages over deterministic ones. We discuss them here: CS787: Advanced Algorithms Lecture 6: Randomized Algorithms In this lecture we introduce randomized algorithms. We will begin by motivating the use of randomized algorithms through a few examples. Then

More information

On the Complexity of Broadcast Scheduling. Problem

On the Complexity of Broadcast Scheduling. Problem On the Complexity of Broadcast Scheduling Problem Sergiy Butenko, Clayton Commander and Panos Pardalos Abstract In this paper, a broadcast scheduling problem (BSP) in a time division multiple access (TDMA)

More information

WDM Network Provisioning

WDM Network Provisioning IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

Empirical analysis of procedures that schedule unit length jobs subject to precedence constraints forming in- and out-stars

Empirical analysis of procedures that schedule unit length jobs subject to precedence constraints forming in- and out-stars Empirical analysis of procedures that schedule unit length jobs subject to precedence constraints forming in- and out-stars Samuel Tigistu Feder * Abstract This paper addresses the problem of scheduling

More information

36 IEEE TRANSACTIONS ON BROADCASTING, VOL. 54, NO. 1, MARCH 2008

36 IEEE TRANSACTIONS ON BROADCASTING, VOL. 54, NO. 1, MARCH 2008 36 IEEE TRANSACTIONS ON BROADCASTING, VOL. 54, NO. 1, MARCH 2008 Continuous-Time Collaborative Prefetching of Continuous Media Soohyun Oh, Beshan Kulapala, Andréa W. Richa, and Martin Reisslein Abstract

More information

UML CS Algorithms Qualifying Exam Fall, 2003 ALGORITHMS QUALIFYING EXAM

UML CS Algorithms Qualifying Exam Fall, 2003 ALGORITHMS QUALIFYING EXAM NAME: This exam is open: - books - notes and closed: - neighbors - calculators ALGORITHMS QUALIFYING EXAM The upper bound on exam time is 3 hours. Please put all your work on the exam paper. (Partial credit

More information

Prioritized Access in a Channel-Hopping Network with Spectrum Sensing

Prioritized Access in a Channel-Hopping Network with Spectrum Sensing Prioritized Access in a Channel-Hopping Network with Spectrum Sensing NSysS, January 9, 206 Outline The problem: traffic prioritization in cognitive networks, and ways to achieve it Related work Details

More information

Maximizing edge-ratio is NP-complete

Maximizing edge-ratio is NP-complete Maximizing edge-ratio is NP-complete Steven D Noble, Pierre Hansen and Nenad Mladenović February 7, 01 Abstract Given a graph G and a bipartition of its vertices, the edge-ratio is the minimum for both

More information

Hardness of Subgraph and Supergraph Problems in c-tournaments

Hardness of Subgraph and Supergraph Problems in c-tournaments Hardness of Subgraph and Supergraph Problems in c-tournaments Kanthi K Sarpatwar 1 and N.S. Narayanaswamy 1 Department of Computer Science and Engineering, IIT madras, Chennai 600036, India kanthik@gmail.com,swamy@cse.iitm.ac.in

More information

New Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band

New Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band New Channel Access Approach for the IEEE 802.15.4 Devices in 2.4 GHz ISM Band Tolga Coplu and Sema F. Oktug Department of Computer Engineering, Istanbul Technical University, Istanbul, Turkey {coplu,oktug}@itu.edu.tr

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks

Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks 1 Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks Sameer Swami 1, Chittabrata Ghosh 2, Rucha P. Dhekne 2, Dharma P. Agrawal 2, and Kenneth A. Berman 1 Laboratory

More information

arxiv: v2 [cs.ni] 23 May 2016

arxiv: v2 [cs.ni] 23 May 2016 Simulation Results of User Behavior-Aware Scheduling Based on Time-Frequency Resource Conversion Hangguan Shan, Yani Zhang, Weihua Zhuang 2, Aiping Huang, and Zhaoyang Zhang College of Information Science

More information

Seminar on. A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm

Seminar on. A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm Seminar on A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm Mohammad Iftakher Uddin & Mohammad Mahfuzur Rahman Matrikel Nr: 9003357 Matrikel Nr : 9003358 Masters of

More information

Cognitive Radio Network Security- A Survey

Cognitive Radio Network Security- A Survey Cognitive Radio Network Security- A Survey Roshan Singh Thakur Prof. Parul Bhanarkar Prof. Girish Agarwal ABHA GAIKWAD-PATIL ABHA GAIKWAD-PATIL ABHA GAIKWAD-PATIL College of Engineering,Nagpur College

More information

July 23, 2015 VIA ELECTRONIC FILING. Marlene H. Dortch, Secretary Federal Communications Commission th Street, SW Washington, DC 20554

July 23, 2015 VIA ELECTRONIC FILING. Marlene H. Dortch, Secretary Federal Communications Commission th Street, SW Washington, DC 20554 July 23, 2015 VIA ELECTRONIC FILING Marlene H. Dortch, Secretary Federal Communications Commission 445 12 th Street, SW Washington, DC 20554 Re: Amendment of Part 15 of the Commission s Rules for Unlicensed

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

Module 6 NP-Complete Problems and Heuristics

Module 6 NP-Complete Problems and Heuristics Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu P, NP-Problems Class

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks 336 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks Vincent W. S. Wong, Member, IEEE, Mark E. Lewis,

More information

Optimal Power Control, Scheduling and Routing in UWB Networks

Optimal Power Control, Scheduling and Routing in UWB Networks TECHNICAL REPORT IC/23/61 1 Optimal Power Control, Scheduling and Routing in UWB Networks Božidar Radunović and Jean-Yves Le Boudec bozidar.radunovic@epfl.ch, jean-yves.leboudec@epfl.ch EPFL, CH-11 Lausanne,

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information